Components of a typical database environment, Database Management System

Assignment Help:

Question:

(a) List four disadvantages of the File Processing System as compared to the Database Systems.

(b) The integrity of a database is enforced by integrity rules. One of these rules, the referential integrity rules, states that the database must not contain any unmatched foreign key values.

(i) Discuss what should happen on an attempt to delete the target of a foreign key reference?

(ii) Discuss what should happen on an attempt to update the primary key of the target of a foreign key reference?

Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique.

(c) List and describe briefly the nine components of a typical database environment.

(d) Explain the difference between external, internal and conceptual schemas. How are these different schema layers related to the concept of logical and physical data independence?


Related Discussions:- Components of a typical database environment

Limitations of file based system, Limitations of File Based System The...

Limitations of File Based System The file-based system has some limitations. The limitations are listed as follows: Isolation and separation of data: When the data is

Differentiate between b-tree and b+ tree, Differentiate between B-tree and ...

Differentiate between B-tree and B + tree    Ans:  A B-tree (or Balanced Tree) is a search tree along with additional constraints that makes sure that the tree is all the time

Illustrate the view of software architecture, Illustrate the view of softwa...

Illustrate the view of software architecture A model is a semantically closed abstraction of system composes of elements. It can be visualized using any of the following five v

Identify the candidate keys, Consider the following six relation schemes an...

Consider the following six relation schemes and their corresponding sets of functional dependencies. In each case identify a. All the candidate keys b. The highest normal for

Function module, When a function module is activated syntax checking is per...

When a function module is activated syntax checking is performed automatically. YEs, a function module is activated syntax checking.

What is enterprise resource planning, What is Enterprise Resource Planning ...

What is Enterprise Resource Planning (ERP), and what kind of a database is used in an ERP application? Enterprise Resource Planning (ERP) is an information system used in manuf

Mobile database, write short note on mobile database

write short note on mobile database

Name the three major database in oracle, Name the three major set of files ...

Name the three major set of files on disk that compose a database in Oracle. There are three main sets of files on disk that compose a database. All the files are binary. These

Explain the function of input controls, Explain the function of input contr...

Explain the function of input controls. Identify four types of input control and explain the function of each. Provide an example of a data integrity error that could occur i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd